Handling Tor and i2p in NURLs #3888
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
3 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#3888
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
NURLs, the new furl replacement that is HTTP based, does not currently support Tor or i2p syntactically. It just has a hostname field... The
hyperlink
library also has issues with parsing it if is forced in to the hostname, which may be legitimate "this is not a valid URI/URL" complaint.One alternative is to switch to combo protocol URLs, e.g.:
Changing the NURL to this could be backwards compatible if
pb://
is synonym for normal HTTPS, as above.Worth breaking out specific cases:
I'm not sure that there's a problem with Tor here; onion services are on syntactically-valid
.onion
URLs with a well-known TLD of ".onion" (RFC 7686) which are "just" host-names.Of course, you do need something that understands what to do with those (which in practice means "using SOCKS5 to the local Tor daemon"). For our case here, txtorcon understands all this and provides "IStreamClientEndpoint" or "IAgent" type interfaces.
The high-level question to answer is:
The answer implied by the ticket description is to look at the scheme and for "pb" use HTTP over TLS, for "pb+tor" use HTTP over Tor, and for "pb+i2p" use HTTP over I2P.
It sounds like this means there might be an alternate answer possible:
Look at the scheme. If it is "pb" and the hostname does not end with ".onion" then use HTTP over TLS. If it is "pb" and the hostname does end with ".onion" then use HTTP over Tor. If it is "pb+i2p" then use HTTP over I2P.
Did I understand the Tor interaction correctly?
If so, I still might prefer the "pb+tor" scheme because of the symmetry it maintains with the other two transports to be supported.
Yeah, "pb+tor" might be better because it also covers the case where you want to use Tor to a clearnet listener. And it's more explicit.
That said, though, "use tor for client-operations" is more of a client decision and doesn't necessarily need to be burned into the NURLS like that -- the only time you need to use Tor as a client is when the listener is on a .onion
There's a lot of other stuff to consider regarding "internet location privacy" so having e.g. a Tahoe option like "--location-privacy" would be more how I'd handle the "tor to clearnet services" situation, because there are other things you'd probably want to put over Tor and e.g. make sure you're not doing local DNS lookups or similar.
BTW, the tor example should look like
pb+tor://1WUX44xKjKdpGLohmFcBNuIRN-8rlv1Iij_7rQ@fjblvrw2jrxnhtg67qpbzi45r7ofojaoo3orzykesly2j3c2m3htapid.onion:34399/jhjbc3bjbhk#v=1
Summarizing some further discussion from IRC ...
There is existing support for having a lot of control over how connections are made. This is in the
connections
section of tahoe.cfg and there's docs for it. Essentially, the GBS client should be prepared to use Tor even for a "pb://..." NURL because maybe the client is configured to prefer privacy-enabling connections even when they are not required to reach a server.There is other configuration required to be a Tor client but it does not belong in NURLs. It covers, eg, the address of a Tor-ifying SOCKS server to which to connect. This configuration is already supported in the
tor
section of tahoe.cfg and this is how the GBS client can figure out how to create a Tor client endpoint (orIAgent
) to use.Foolscap's I2P support is somewhat more featureful than the
pb+i2p:*...
example given here. It accepts mostly-arbitrary key/value pairs in the connection hints. There's room in thepb+i2p
scheme though - for example, in the query arguments. egpb+i2p:*1WUX44xKjKdpGLohmFcBNuIRN-8rlv1Iij_7rQ@sdsdfsdfds/jhjbc3bjbhk#v=1&foo=bar
I think this all leads me to conclude that we shouldn't have
pb+tor:
scheme. There should just be apb://
scheme and the other configuration tells a client whether to use Tor or not.If the NURL ends in the well-defined TLD
.onion
then the client has to decide whether to use that NURL at all or not. If it has Tor configuration, then it can attempt to use it. If it does not, it should not attempt to use it.More notes: the way we've decided to implement listening (#3902) is by sharing the Foolscap TCP port, and therefore the Foolscap listening and configuration-parsing logic, specifically
tub.port
andtub.location
.For the moment, then, the actual logic for listening on these ports is implemented by Foolscap, there is no need for HTTP-specific code. However, we do need custom NURL generation for Tor (the
.onion
domain) and I2P. This can be done post-#3902, and sounds like we decided onpb:*
for Tor andpb+i2p:*
for I2P. Even though the Tor endpoint has same URL structure as normal endpoint, it still needs custom code to generate it.In the long term we will need to reimplement the listening logic, but that might take a while due to need for backwards compatibility.
On the client side we need two things:
.onion
URLs (#3910)..onion
and public servers. For example, the Tor Browser has a bunch of policies about how it routes to different domains and to a specific domain to reduce this risk. This is probably a long-term thing (#3911).So actually the spec for NURLs has a proposal; regardless of what gets chosen (spec or above), we should make sure everything is in sync!
https://github.com/tahoe-lafs/tahoe-lafs/blob/master/docs/specifications/url.rst
Re-reading:
So real issue is maybe "are we doing right thing in HTTP client when given .onion and .i2p domains". And custom URLs are nice hint but maybe not actually required.
Going to close this since much of the work is either done (Tor) or split off into I2P-specific tickets (#4037).